General

  • Target

    17c7f39a9ba873ac02d2a2dfeb1e8e05dceb416af19b806d0853ce9c2c879d4f

  • Size

    168KB

  • Sample

    220212-dw7z8afde3

  • MD5

    124f80ca5c6591aca8e81bce1f87f53d

  • SHA1

    251b647b1d170880d032dde51ecde2f4a46277e1

  • SHA256

    17c7f39a9ba873ac02d2a2dfeb1e8e05dceb416af19b806d0853ce9c2c879d4f

  • SHA512

    b7c18bfb5b87bb0bca45c10dfdbbd5da75c63e292d1a71bf53fd852d7cae649bfe8ed7d4e36e5359c97f076ac934f2f5da4991f2bd7c0ea41b5fd73e7c82f5d2

Malware Config

Targets

    • Target

      17c7f39a9ba873ac02d2a2dfeb1e8e05dceb416af19b806d0853ce9c2c879d4f

    • Size

      168KB

    • MD5

      124f80ca5c6591aca8e81bce1f87f53d

    • SHA1

      251b647b1d170880d032dde51ecde2f4a46277e1

    • SHA256

      17c7f39a9ba873ac02d2a2dfeb1e8e05dceb416af19b806d0853ce9c2c879d4f

    • SHA512

      b7c18bfb5b87bb0bca45c10dfdbbd5da75c63e292d1a71bf53fd852d7cae649bfe8ed7d4e36e5359c97f076ac934f2f5da4991f2bd7c0ea41b5fd73e7c82f5d2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks